Computer Science ›› 2019, Vol. 46 ›› Issue (8): 171-177.doi: 10.11896/j.issn.1002-137X.2019.08.028

• Network & Communication • Previous Articles     Next Articles

Study on Application of Network Coding and Multipath Transmission in Internet Live Video Broadcasting

ZHANG Jin-hui1, DENG Qian2, LI Zhen-yu2   

  1. ( Nanjing Research Institute.Huawei Technologies Co.,Ltd.,Nanjing 210012,China)1
    (Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100190,China)2
  • Received:2018-10-07 Online:2019-08-15 Published:2019-08-15

Abstract: Internet live video users can upload videos in real time,and other users can watch online in real time.This mode makes it impossible to push video to CDN node in advance based on popularity,and requires that the delay from video generates to viewers be as low as possible.The performance of video uploading has the greatest impact on the viewing experience of Internet live video.The pause of the upload stream often causes no data to be sent in the download stream,accounting for 87.6% of the video freeze.In response to the above questions,the paper proposed a method of combining network coding and multi-path transmission into Internet live video uploading.Firstly,the real-time generated video data are redundantly coded through network coding to enhance anti-dropping packets.Secondly,the speed of each link of the uploading terminal to the CDN is measured,and the performance of each link is evaluated by the utility function.Finally,the encoded data are allocated to the links for transmission according to the utility values of different links.Theoretical analysis and experiments show that the transmission rate is 7.6 times that of TCP under the network condition of 2% packet loss rate and 50ms delay compared with the TCP transmission method currently widely used.The results show that the combination of network coding and multi-path transmission into Internet live video uploading can significantly improve the upload rate,quickly sense the changes of the network,and enhance the adaptability to the changing network environment

Key words: Internet, Live video, Multipath transmission, Network coding, Streaming

CLC Number: 

  • TP393.02
[1]中国互联网络信息中心.第41次中国互联网络发展状况统计报告[OL].http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201803/P020180305409870339136.pdf.
[2]CARBUNAR B,PEARCE M,VASUDEVAN V,et al.Predictive Caching for Video on Demand CDNs[C]∥Global Telecommunications Conference.IEEE,2011.
[3]ZHOU Y,CHEN L,YANG C,et al.Video Popularity Dynamics and Its Implication for Replication[J].IEEE Transactions on Multimedia,2015,17(8):1273-1285.
[4]HAIMSON O L,TANG J C.What Makes Live Events Engaging on Facebook Live,Periscope,and Snapchat[C]∥CHI Conference on Human Factors in Computing Systems.ACM,2017:48-60.
[5]SIEKKINEN M,MASALA E.A First Look at Quality of Mobile Live Streaming Experience:the Case of Periscope[C]∥ACM on Internet Measurement Conference.ACM,2016:477-483.
[6]RODRIGUEZ-GIL L,ORDUÑA P,GARC A-ZUBIA J,et al. Interactive live-streaming technologies and approaches for web-based applications[J].Multimedia Tools & Applications,2017(6130):1-32.
[7]ZHOU J,WU Q,LI Z,et al.A study on TCP performance of crowdsourced live streaming[J].High Technology Letters,2017,23(1):109-116.
[8]WANG B,ZHANG X,WANG G,et al.Anatomy of a Personalized Livestreaming System[C]∥ACM on Internet Measurement Conference.ACM,2016:485-498.
[9]PANG H,ZHI W,CHEN Y,et al.Content Harvest Network:Optimizing First Mile for Crowdsourced Live Streaming[J].IEEE Transactions on Circuits & Systems for Video Technology,PP(99):1-1.
[10]DENG J,TYSON G,CUADRADO F,et al.Internet Scale User-Generated Live Video Streaming:The Twitch Case[C]∥International Conference on Passive and Active Network Measurement.Springer,Cham,2017.
[11]RODR GUEZ-GIL L,GARC A-ZUBIA J,ORDUÑA P,et al. An Open and Scalable Web-Based Interactive Live-Streaming architecture:The WILSP Platform[J].IEEE Access,2017,5(99):9842-9856.
[12]ZHOU J,WU Q,LI Z,et al.Demystifying and mitigating TCP stalls at the server side[C]∥ACM Conference on Emerging NETWORKING Experiments and Technologies.ACM,2015:9.
[13]DUKKIPATI N,REFICE T,CHENG Y,et al.An argument for increasing TCP’s initial congestion window[J].Acm Sigcomm Computer Communication Review,2010,40(3):26-33.
[14]CARDWELL N,CHENG Y C,STEPHEN C G,et al.BBR:congestion-based congestion control[J].Communications of the Acm,2017,60(2):58-66.
[15]FORD A,RAICIU C,HANDLEY M,et al.TCP Extensions for Multipath Operation with Multiple Addresses:draft-ietf-mptcp-multiaddressed-03[OL].https://dial.uclouvain.be/pr/boreal/en/object/boreal%3A71362.
[16]ROSKIND J.QUIC-a multiplexed stream transport over UDP[OL].https://www.chromium.org/quic.
[17]LI S Y R,YEUNG R W,CAI N.Linear network coding[J].IEEE Transactions on Information Theory,2003,49(2):371-381.
[18]KOETTER R,MEDARD M.An algebraic approach to network coding[J].IEEE/ACM Transactions on Networking,2003,11(5):782-795.
[19]SCHULZRINNE H,CASNER S,FREDERICKR,et al.RTP:A Transport Protocol for Real-Time Applications,RFC 3550 [S].IETF,2003,7.
[20]WU Q,LI Z,TYSON G,et al.Privacy-Aware Multipath Video Caching for Content-Centric Networks[J].IEEE Journal on Selected Areas in Communications,2016,34(8):2219-2230.
[21]PEDERSEN M V,HEIDE J,FITZEK F H P.Kodo:An Open and Research Oriented Network Coding Library[C]∥NETWORKING 2011 Workshops-International IFIP TC 6 Workshops.Springer-Verlag,2011:145-152.
[1] CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112.
[2] WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9.
[3] ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270.
[4] ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743.
[5] DONG Dan-dan, SONG Kang. Performance Analysis on Reconfigurable Intelligent Surface Aided Two-way Internet of Things Communication System [J]. Computer Science, 2022, 49(6): 19-24.
[6] Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54.
[7] PENG Dong-yang, WANG Rui, HU Gu-yu, ZU Jia-chen, WANG Tian-feng. Fair Joint Optimization of QoE and Energy Efficiency in Caching Strategy for Videos [J]. Computer Science, 2022, 49(4): 312-320.
[8] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[9] ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun. New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [J]. Computer Science, 2022, 49(3): 329-337.
[10] CHENG Zhao-wei, SHEN Hang, WANG Yue, WANG Min, BAI Guang-wei. Deep Reinforcement Learning Based UAV Assisted SVC Video Multicast [J]. Computer Science, 2021, 48(9): 271-277.
[11] LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54.
[12] TANG Liang, LI Fei. Research on Forecasting Model of Internet of Vehicles Security Situation Based on Decision Tree [J]. Computer Science, 2021, 48(6A): 514-517.
[13] YU Jian-ye, QI Yong, WANG Bao-zhuo. Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark [J]. Computer Science, 2021, 48(6A): 518-523.
[14] LI Jia-ming, ZHAO Kuo, QU Ting, LIU Xiao-xiang. Research and Analysis of Blockchain Internet of Things Based on Knowledge Graph [J]. Computer Science, 2021, 48(6A): 563-567.
[15] ZHENG Zeng-qian, WANG Kun, ZHAO Tao, JIANG Wei, MENG Li-min. Load Balancing Mechanism for Bandwidth and Time-delay Constrained Streaming Media Server Cluster [J]. Computer Science, 2021, 48(6): 261-267.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!